Showing 242 open source projects for "access"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    ...Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 264 This Week
    Last Update:
    See Project
  • 2
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    Secure, context-aware access that just works. Access internal resources securely. Implement zero trust. Achieve compliance. All without the headache of a VPN. For teams that prefer a hosted solution while keeping data governance. For organizations that need advanced scaling, access control, and governance capabilities. IT and developers need a scalable access control solution to keep users productive, happy, and secure.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3
    hydra

    hydra

    Cloud native, security-first, API security for your infrastructure

    Secure access to your applications and APIs, and authenticate third party users. Ory / Hydra is Open Source and OpenID Connect Certified® technology that integrates with any login system. Get started in minutes, and provide secure access to your application and API endpoints. Ory / Hydra works with any login system and only a few lines of code are required.
    Downloads: 35 This Week
    Last Update:
    See Project
  • 4
    ORY Oathkeeper

    ORY Oathkeeper

    A cloud native Identity & Access Proxy / API (IAP)

    ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. The BeyondCorp Model is designed by Google and secures applications in Zero-Trust networks. An Identity & Access Proxy is typically deployed in front of (think API Gateway) web-facing applications and is capable of authenticating and optionally authorizing access requests.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 5
    Octelium

    Octelium

    A next-gen FOSS self-hosted unified zero trust secure access platform

    Octelium is an open source, self-hosted unified secure-access platform built for modern infrastructure and hybrid environments. It positions itself as more than a typical VPN; it supports zero-trust network access (ZTNA), “BeyondCorp”-style access, API/AI gateway functionality, and even serves as a PaaS-like deployment surface. One of its key strengths is identity-based, application-layer (L7) aware control, meaning access decisions are made per request, with context and policy rather than simple network-level allow/block rules. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    NetBird

    NetBird

    Connect your devices into a secure WireGuard-based overlay network

    NetBird is an open-source solution that builds a WireGuard®-based overlay network enabling seamless, encrypted peer-to-peer connectivity without the complexity of firewall rules, port forwarding, or centralized VPN gateways. It integrates access control features such as SSO and MFA for secure, policy-driven networking. Every machine in the network runs NetBird Agent (or Client) that manages WireGuard. Every agent connects to Management Service that holds network state, manages peer IPs, and distributes network updates to agents (peers). NetBird agent uses WebRTC ICE implemented in pion/ice library to discover connection candidates when establishing a peer-to-peer connection between machines.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 7
    Paralus

    Paralus

    All-in-one Kubernetes access manager

    Paralus is an open-source, zero-trust access management solution for Kubernetes. It provides secure access to Kubernetes clusters without the need for VPNs, streamlining operations and enhancing security. Paralus can be easily integrated with your pre-existing RBAC configuration and your SSO providers, or Identity Providers (IdP) that support OIDC (OpenID Connect). Through just-in-time service account creation and fine-grained user credential management, Paralus provides teams with an adaptable system for guaranteeing secure access to resources when necessary, along with the ability to rapidly identify and respond to threats through dynamic permission revocation and real-time audit logs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Prometheus SNMP Exporter

    Prometheus SNMP Exporter

    SNMP Exporter for Prometheus

    This exporter is the recommended way to expose SNMP data in a format that Prometheus can ingest. To simply get started, it's recommended to use the if_mib module with switches, access points, or routers using the public_v2 auth module, which should be a read-only access community on the target device. Note, that community strings in SNMP are not considered secrets, as they are sent unencrypted in SNMP v1 and v2c. For secure access, SNMP v3 is required.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 9
    Lantern

    Lantern

    Tool to access videos, messaging, and other popular apps

    Can't access your favorite apps? Download Lantern to easily access videos, messaging, and other popular apps while at school or work. Lantern is an application that allows you to bypass firewalls to use your favorite applications and access your favorite websites. Lantern does not cooperate with any law enforcement in any country. Lantern encrypts all of your traffic to blocked sites and services to protect your data and privacy.
    Downloads: 10 This Week
    Last Update:
    See Project
  • Award-Winning Medical Office Software Designed for Your Specialty Icon
    Award-Winning Medical Office Software Designed for Your Specialty

    Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.

    RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
    Learn More
  • 10
    spicedb

    spicedb

    Open Source, Google Zanzibar-inspired permissions database

    SpiceDB is a graph database purpose-built for storing and evaluating access control data. As of 2021, broken access control became the #1 threat to the web. With SpiceDB, developers finally have the solution to stopping this threat the same way as the hyperscalers. Open Source, Google Zanzibar-inspired permissions database to enable fine-grained access control for customer applications. Building modern authorization from scratch is non-trivial and requires years of development from domain experts. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    ShellHub

    ShellHub

    Get seamless remote access to any Linux device

    ShellHub is a centralized SSH gateway that allows users to remotely access and manage their servers and devices from anywhere, using a web browser or a mobile app. It provides a secure and convenient way to connect to and control your servers and devices and can help to improve the security of your servers by preventing unauthorized access. ShellHub incorporates the use of Docker containers to facilitate the integration of new devices into the platform, simplifying configuration. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    SecretScanner

    SecretScanner

    Find secrets and passwords in container images and file systems

    Deepfence SecretScanner can find unprotected secrets in container images or file systems. Secrets are any kind of sensitive or private data that gives authorized users permission to access critical IT infrastructure (such as accounts, devices, networks, cloud based services), applications, storage, databases, and other kinds of critical data for an organization. For example, passwords, AWS access IDs, AWS secret access keys, Google OAuth Key etc. are secrets. Secrets should be strictly kept private. However, sometimes attackers can easily access secrets due to flawed security policies or inadvertent mistakes by developers. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    Vault

    Vault

    Tool for secrets management and encryption as a service

    ...Datacenters with inherently high-trust networks with clear network perimeters. Multiple clouds and private datacenters without a clear network perimeter. Use policy to codify, protect, and automate access to secrets. Seamlessly integrate any trusted identity provider.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    AWS IAM Authenticator for Kubernetes

    AWS IAM Authenticator for Kubernetes

    Tool to use AWS IAM credentials to authenticate to Kubernetes clusters

    ...If you are an administrator running a Kubernetes cluster on AWS, you already need to manage AWS IAM credentials to provision and update the cluster. By using AWS IAM Authenticator for Kubernetes, you avoid having to manage a separate credential for Kubernetes access. AWS IAM also provides a number of nice properties such as an out-of-band audit trail (via CloudTrail) and 2FA/MFA enforcement.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15
    Cerbos

    Cerbos

    Cerbos is the open core, language-agnostic authorization solution

    ...Focus on delivering exceptional products, not maintaining the authorization infrastructure. Context-aware role definitions and attribute-based access control. Implement adaptable, granular security policies that exceed standard role-based access control.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16
    MCP Grafana

    MCP Grafana

    MCP server for Grafana

    The Grafana MCP Server is a Model Context Protocol (MCP) server designed to provide access to Grafana instances and their surrounding ecosystems. It enables seamless integration with Grafana's visualization and monitoring capabilities. ​
    Downloads: 6 This Week
    Last Update:
    See Project
  • 17
    Soft Serve

    Soft Serve

    A tasty, self-hostable Git server for the command line

    ...Both git and reload commands need admin access to the server to work. So make sure you have added your key as an admin user, or you’re using anon-access: admin-access in the configuration.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Hysteria

    Hysteria

    Hysteria is a powerful, lightning fast and censorship resistant proxy

    ...It supports a wide range of use cases including SOCKS5 and HTTP proxying, TCP/UDP forwarding, Linux TProxy for network redirection, and even tunneling via TUN interfaces, making it a flexible choice for developers and network engineers needing robust remote access or traffic obfuscation. Because it’s implemented in Go and MIT-licensed, the project provides cross-platform builds for major operating systems and architectures, letting users deploy servers and clients for both personal and infrastructural purposes.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 19
    Casdoor

    Casdoor

    An open-source Identity and Access Management (IAM)

    A UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supporting OAuth 2.0, OIDC, SAML and CAS, integrated with Casbin RBAC and ABAC permission management. Within a few steps, we can setup a Casdoor app and realize our authorization management. Casdoor has a front-end back-end separation architecture, with maneuverable web UI and supporting high concurrency.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Talos Linux

    Talos Linux

    Talos Linux is a modern Linux distribution built for Kubernetes

    ...Open source project from the team at Sidero Labs. It only takes 3 minutes to launch a Talos cluster on your laptop inside Docker. Talos reduces your attack surface. It's minimal, hardened and immutable. All API access is secured with mutual TLS (mTLS) authentication. Talos eliminates configuration drift, reduces unknown factors by employing immutable infrastructure ideology, and delivers atomic updates. Talos simplifies your architecture, increases your agility, and always delivers current stable Kubernetes and Linux versions. Talos consists of only a handful of binaries and shared libraries: just enough to run containerd and a small set of system services.
    Downloads: 28 This Week
    Last Update:
    See Project
  • 21
    OpenFGA
    ...Look in our Community section for third-party SDKs and tools. It can also be used as a library. OpenFGA takes the best ideas from Google's Zanzibar paper for Relationship-Based Access Control, and also solves problems for Role-based Access Control and Attribute-Based Access Control use cases. The modeling language is powerful enough for engineers, but friendly enough for other stakeholders on your team as well.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Obot MCP Gateway

    Obot MCP Gateway

    Hosting, Registry, Gateway, and Chat Client

    Obot is an open-source platform built to help organizations adopt and operate Model Context Protocol (MCP) capabilities in a centralized, production-friendly way. It combines multiple MCP building blocks into one system, including hosting for MCP servers, a registry for discovery, a gateway layer to route access, and a standards-compliant chat client experience. The project is aimed at solving common enterprise rollout problems such as reliably hosting servers for internal and external users, curating “approved” MCP servers for employees to find, and enforcing authentication, access control, and auditable activity. It also supports building richer agents and chatbots that can leverage MCP servers while keeping operations manageable for IT and platform teams. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    db

    db

    Data access layer for PostgreSQL, CockroachDB, MySQL, SQLite, etc.

    upper/db is a productive data access layer (DAL) for Go that provides agnostic tools to work with different data sources. Data access layer for PostgreSQL, CockroachDB, MySQL, SQLite and MongoDB with ORM-like features. Our agnostic API is compatible with SQL and NoSQL databases. Use the SQL builder or raw SQL statements for advanced cases. An (optional) ORM-like layer is available for all your data modelling needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Navidrome

    Navidrome

    Your Personal Streaming Service

    ...It supports large libraries and handles a wide variety of audio formats while maintaining very low resource usage, so it runs well even on small servers, Raspberry Pi devices, and other constrained hardware. Users can browse, play, and organize tracks and playlists via a modern web interface, plus they can control access for multiple users with individualized play counts, favorites, and library permissions. Navidrome also implements the Subsonic API, making it compatible with many third-party players and apps across different platforms. It automatically monitors and indexes your library for new content, supports on-the-fly transcoding to adapt audio streams to different network conditions.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 25
    Nezha Monitoring

    Nezha Monitoring

    Self-hosted, lightweight server and website monitoring and O&M tool

    Nezha is a self-hosted monitoring and alerting tool for servers, providing real-time tracking and notifications on server health and performance.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next